Anastasia Ivaschenko

Anastasia Ivaschenko
Saint Petersburg State University | SPBU · Department of Computer Science

Magister

About

23
Publications
838
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
63
Citations
Introduction
Skills and Expertise
Additional affiliations
March 2019 - present
St. Petersburg Federal Research Center of the Russian Academy of Sciences
Position
  • junior research

Publications

Publications (23)
Article
Numerical data retrieved from the accounts of users of a popular Russian-language online social network have been used to automate the prediction of the PEN test (temperament test) results. This study aims to automate the assessment of personality traits of online social network users by comparing the test results and the content posted by the user...
Chapter
The paper discusses the lack of automated systems that provide personalized career advice without the need for traditional career guidance tests or counselling sessions. It suggests analysing social media data, specifically the topics of the user subscriptions, could be used to generate personalized career recommendations. The article proposes the...
Chapter
Full-text available
The problem solved in this article is to predict the expression of personality traits of a user, which can be obtained from the Life Style Index questionnaire, through the analysis of the graphical content published in his social media account. The proposed approach is to identify faces in photos from users’ accounts and use them to assess the expr...
Chapter
The subject of the research is the predictors of the intensity of interaction between users in online social networks, which can be formalized in probability estimate of the spread of multistep social engineering attacks. The research methodology is based on comparing, using the methods of statistical analysis, the observed online interaction of us...
Chapter
Full-text available
Multistep social engineering attacks (that involve a chain of users) are a serious threat to an organization’s information security. Usually such attacks require an integrated approach to reduce the probability of their success. This approach can be analysis of the social graph with modeling of scenarios for the spread of multistep social engineeri...
Article
This paper presents a conceptual model of a system that allows automating the offer of recommendations regarding the methods of conducting distance learning. The initial datafor the system are links to students’ accounts in popular Russian-language social networks. The system downloads the available information from the provided links, analyzes the...
Article
Social engineering attacks are one of the key problems of our time. Every year, their number and efficiency continue to grow. This paper provides an overview of existing studies devoted to the problem of protecting users from social engineering attacks. On the basis of the review, a conceptual model of the social engineering attack cycle and the ar...
Chapter
Full-text available
The purpose of this study is to propose approaches to validation of quantification of variable “relationship between users” in the context of social engineering attacks, as well as consideration of the accuracy of the proposed model, correlativity checks of used in research formulations and desired characteristics and other conditions necessary for...
Chapter
Full-text available
This article proposes a mathematical model that helps to track a player’s game actions and present them in a structured form. The gaming process is presented as a set of states that are connected by a player’s actions. Each state is a set of predicates that characterize the player’s knowledge about the game. This mathematical model was developed as...
Chapter
Full-text available
In this research we present the hybrid model of finding the most critical distribution trajectories of multipath Social engineering attacks, passing through which by the malefactor on a global basis has the topmost degree of probability and will bring the greatest loss to the company. The solution of search problem concerning the most critical traj...
Chapter
The goal of this article is to propose an approach to linguistic values quantification and to consider an example of its application to the relationship types between users in the popular social network in Russia “VK”. To achieve this aim, we used the results of a sociological survey, by which were found the frequency of the order, then the probabi...
Chapter
Full-text available
The purpose of this article is to propose an approach to denoting the parameters of the model for assessing the probability of success of a multi-pass social engineering attack of an attacker on a user. These parameters characterize the evaluation of the probability of propagation of social engineering attacks from user to user in one type of inter...
Article
Full-text available
The purpose of this study is to study the impact of possible types of relationships between users, which are represented in the social network “VKontakte”, on the probability of the spread of a social engineering attack.Methods. To achieve this goal, a survey was developed and a web page was created, which is used to collect responses from responde...
Chapter
Full-text available
In this article we propose to consider the trajectories of social engineering attacks, which are the most critical from the point of view of the expected damage to the organization, and not from the point of view of the probability of success of the defeat of the user and, indirectly, critical documents to which he has access. The article proposes...
Article
Full-text available
Introduction: Social engineering attacks can be divided into two types: direct (one-way) and multi-pass ones, passing through a chain of users. Normally, there are several propagation paths for a multi-pass social engineering attack between two users. Estimates of the probabilities of an attack to spread along different trajectories will differ. Pu...

Network

Cited By